- To set the cap flag, a user (process) needs CAP_SETFCAP raised, and thekernel (besides the normal fs checks) validates the cap headers as wellfor legality. (this also applies to creating files with this flag raised;i.e., through a copy operation)- While the cap flag is set, the file is immutable, so the file ownercan't edit the file directly to raise caps.- A file that is both setuid root and capability enabled has only thosecapabilities granted in conjuction w/ the headers; if it's only setuidroot, the kernel can (as a configurable option?) treat it as before andraise all caps.

This can bring us _really_ close to true capabilities support,while avoiding the ugly hack of also storing uid + suid bit in the elfheaders.

thoughts?

- --David L. ParsleyNetwork SpecialistCity of Salem Schools

-To unsubscribe from this list: send the line "unsubscribe linux-kernel" inthe body of a message to majordomo@vger.rutgers.eduPlease read the FAQ at http://www.tux.org/lkml/